mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-27 11:55:06 +00:00
1174 lines
30 KiB
C
1174 lines
30 KiB
C
/* clparse.c
|
|
|
|
Parser for dhclient config and lease files... */
|
|
|
|
/*
|
|
* Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
|
|
* Copyright (c) 1996-2003 by Internet Software Consortium
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
|
|
* OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*
|
|
* Internet Systems Consortium, Inc.
|
|
* 950 Charter Street
|
|
* Redwood City, CA 94063
|
|
* <info@isc.org>
|
|
* http://www.isc.org/
|
|
*
|
|
* This software has been written for Internet Systems Consortium
|
|
* by Ted Lemon in cooperation with Vixie Enterprises and Nominum, Inc.
|
|
* To learn more about Internet Systems Consortium, see
|
|
* ``http://www.isc.org/''. To learn more about Vixie Enterprises,
|
|
* see ``http://www.vix.com''. To learn more about Nominum, Inc., see
|
|
* ``http://www.nominum.com''.
|
|
*/
|
|
|
|
#ifndef lint
|
|
static char copyright[] =
|
|
"$Id: clparse.c,v 1.62.2.6 2004/06/10 17:59:11 dhankins Exp $ Copyright (c) 2004 Internet Systems Consortium. All rights reserved.\n"
|
|
"$FreeBSD$\n";
|
|
#endif /* not lint */
|
|
|
|
#include "dhcpd.h"
|
|
|
|
static TIME parsed_time;
|
|
|
|
struct client_config top_level_config;
|
|
|
|
char client_script_name [] = _PATH_DHCLIENT_SCRIPT;
|
|
|
|
u_int32_t default_requested_options [] = {
|
|
DHO_SUBNET_MASK,
|
|
DHO_BROADCAST_ADDRESS,
|
|
DHO_TIME_OFFSET,
|
|
DHO_ROUTERS,
|
|
DHO_DOMAIN_NAME,
|
|
DHO_DOMAIN_NAME_SERVERS,
|
|
DHO_HOST_NAME,
|
|
0
|
|
};
|
|
|
|
/* client-conf-file :== client-declarations END_OF_FILE
|
|
client-declarations :== <nil>
|
|
| client-declaration
|
|
| client-declarations client-declaration */
|
|
|
|
isc_result_t read_client_conf ()
|
|
{
|
|
struct client_config *config;
|
|
struct client_state *state;
|
|
struct interface_info *ip;
|
|
isc_result_t status;
|
|
|
|
/* Set up the initial dhcp option universe. */
|
|
initialize_common_option_spaces ();
|
|
|
|
/* Initialize the top level client configuration. */
|
|
memset (&top_level_config, 0, sizeof top_level_config);
|
|
|
|
/* Set some defaults... */
|
|
top_level_config.timeout = 60;
|
|
top_level_config.select_interval = 0;
|
|
top_level_config.reboot_timeout = 10;
|
|
top_level_config.retry_interval = 300;
|
|
top_level_config.backoff_cutoff = 15;
|
|
top_level_config.initial_interval = 3;
|
|
top_level_config.bootp_policy = P_ACCEPT;
|
|
top_level_config.script_name = path_dhclient_script;
|
|
top_level_config.requested_options = default_requested_options;
|
|
top_level_config.omapi_port = -1;
|
|
top_level_config.do_forward_update = 1;
|
|
|
|
group_allocate (&top_level_config.on_receipt, MDL);
|
|
if (!top_level_config.on_receipt)
|
|
log_fatal ("no memory for top-level on_receipt group");
|
|
|
|
group_allocate (&top_level_config.on_transmission, MDL);
|
|
if (!top_level_config.on_transmission)
|
|
log_fatal ("no memory for top-level on_transmission group");
|
|
|
|
status = read_client_conf_file (path_dhclient_conf,
|
|
(struct interface_info *)0,
|
|
&top_level_config);
|
|
if (status != ISC_R_SUCCESS) {
|
|
;
|
|
#ifdef LATER
|
|
/* Set up the standard name service updater routine. */
|
|
parse = (struct parse *)0;
|
|
status = new_parse (&parse, -1, default_client_config,
|
|
(sizeof default_client_config) - 1,
|
|
"default client configuration", 0);
|
|
if (status != ISC_R_SUCCESS)
|
|
log_fatal ("can't begin default client config!");
|
|
|
|
do {
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == END_OF_FILE)
|
|
break;
|
|
parse_client_statement (cfile,
|
|
(struct interface_info *)0,
|
|
&top_level_config);
|
|
} while (1);
|
|
end_parse (&parse);
|
|
#endif
|
|
}
|
|
|
|
/* Set up state and config structures for clients that don't
|
|
have per-interface configuration statements. */
|
|
config = (struct client_config *)0;
|
|
for (ip = interfaces; ip; ip = ip -> next) {
|
|
if (!ip -> client) {
|
|
ip -> client = (struct client_state *)
|
|
dmalloc (sizeof (struct client_state), MDL);
|
|
if (!ip -> client)
|
|
log_fatal ("no memory for client state.");
|
|
memset (ip -> client, 0, sizeof *(ip -> client));
|
|
ip -> client -> interface = ip;
|
|
}
|
|
|
|
if (!ip -> client -> config) {
|
|
if (!config) {
|
|
config = (struct client_config *)
|
|
dmalloc (sizeof (struct client_config),
|
|
MDL);
|
|
if (!config)
|
|
log_fatal ("no memory for client config.");
|
|
memcpy (config, &top_level_config,
|
|
sizeof top_level_config);
|
|
}
|
|
ip -> client -> config = config;
|
|
}
|
|
}
|
|
return status;
|
|
}
|
|
|
|
int read_client_conf_file (const char *name, struct interface_info *ip,
|
|
struct client_config *client)
|
|
{
|
|
int file;
|
|
struct parse *cfile;
|
|
const char *val;
|
|
int token;
|
|
isc_result_t status;
|
|
|
|
if ((file = open (name, O_RDONLY)) < 0)
|
|
return uerr2isc (errno);
|
|
|
|
cfile = (struct parse *)0;
|
|
new_parse (&cfile, file, (char *)0, 0, path_dhclient_conf, 0);
|
|
|
|
do {
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == END_OF_FILE)
|
|
break;
|
|
parse_client_statement (cfile, ip, client);
|
|
} while (1);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
status = (cfile -> warnings_occurred
|
|
? ISC_R_BADPARSE
|
|
: ISC_R_SUCCESS);
|
|
close (file);
|
|
end_parse (&cfile);
|
|
return status;
|
|
}
|
|
|
|
|
|
/* lease-file :== client-lease-statements END_OF_FILE
|
|
client-lease-statements :== <nil>
|
|
| client-lease-statements LEASE client-lease-statement */
|
|
|
|
void read_client_leases ()
|
|
{
|
|
int file;
|
|
struct parse *cfile;
|
|
const char *val;
|
|
int token;
|
|
|
|
/* Open the lease file. If we can't open it, just return -
|
|
we can safely trust the server to remember our state. */
|
|
if ((file = open (path_dhclient_db, O_RDONLY)) < 0)
|
|
return;
|
|
cfile = (struct parse *)0;
|
|
new_parse (&cfile, file, (char *)0, 0, path_dhclient_db, 0);
|
|
|
|
do {
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token == END_OF_FILE)
|
|
break;
|
|
if (token != LEASE) {
|
|
log_error ("Corrupt lease file - possible data loss!");
|
|
skip_to_semi (cfile);
|
|
break;
|
|
} else
|
|
parse_client_lease_statement (cfile, 0);
|
|
|
|
} while (1);
|
|
|
|
close (file);
|
|
end_parse (&cfile);
|
|
}
|
|
|
|
/* client-declaration :==
|
|
SEND option-decl |
|
|
DEFAULT option-decl |
|
|
SUPERSEDE option-decl |
|
|
PREPEND option-decl |
|
|
APPEND option-decl |
|
|
hardware-declaration |
|
|
REQUEST option-list |
|
|
REQUIRE option-list |
|
|
TIMEOUT number |
|
|
RETRY number |
|
|
REBOOT number |
|
|
SELECT_TIMEOUT number |
|
|
SCRIPT string |
|
|
VENDOR_SPACE string |
|
|
interface-declaration |
|
|
LEASE client-lease-statement |
|
|
ALIAS client-lease-statement |
|
|
KEY key-definition */
|
|
|
|
void parse_client_statement (cfile, ip, config)
|
|
struct parse *cfile;
|
|
struct interface_info *ip;
|
|
struct client_config *config;
|
|
{
|
|
int token;
|
|
const char *val;
|
|
struct option *option;
|
|
struct executable_statement *stmt, **p;
|
|
enum statement_op op;
|
|
int lose;
|
|
char *name;
|
|
struct data_string key_id;
|
|
enum policy policy;
|
|
int known;
|
|
int tmp, i;
|
|
isc_result_t status;
|
|
|
|
switch (peek_token (&val, (unsigned *)0, cfile)) {
|
|
case INCLUDE:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != STRING) {
|
|
parse_warn (cfile, "filename string expected.");
|
|
skip_to_semi (cfile);
|
|
} else {
|
|
status = read_client_conf_file (val, ip, config);
|
|
if (status != ISC_R_SUCCESS)
|
|
parse_warn (cfile, "%s: bad parse.", val);
|
|
parse_semi (cfile);
|
|
}
|
|
return;
|
|
|
|
case KEY:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
if (ip) {
|
|
/* This may seem arbitrary, but there's a reason for
|
|
doing it: the authentication key database is not
|
|
scoped. If we allow the user to declare a key other
|
|
than in the outer scope, the user is very likely to
|
|
believe that the key will only be used in that
|
|
scope. If the user only wants the key to be used on
|
|
one interface, because it's known that the other
|
|
interface may be connected to an insecure net and
|
|
the secret key is considered sensitive, we don't
|
|
want to lull them into believing they've gotten
|
|
their way. This is a bit contrived, but people
|
|
tend not to be entirely rational about security. */
|
|
parse_warn (cfile, "key definition not allowed here.");
|
|
skip_to_semi (cfile);
|
|
break;
|
|
}
|
|
parse_key (cfile);
|
|
return;
|
|
|
|
/* REQUIRE can either start a policy statement or a
|
|
comma-seperated list of names of required options. */
|
|
case REQUIRE:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == AUTHENTICATION) {
|
|
policy = P_REQUIRE;
|
|
goto do_policy;
|
|
}
|
|
parse_option_list (cfile, &config -> required_options);
|
|
return;
|
|
|
|
case IGNORE:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
policy = P_IGNORE;
|
|
goto do_policy;
|
|
|
|
case ACCEPT:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
policy = P_ACCEPT;
|
|
goto do_policy;
|
|
|
|
case PREFER:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
policy = P_PREFER;
|
|
goto do_policy;
|
|
|
|
case DONT:
|
|
next_token (&val, (unsigned *)0, cfile);
|
|
policy = P_DONT;
|
|
goto do_policy;
|
|
|
|
do_policy:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token == AUTHENTICATION) {
|
|
if (policy != P_PREFER &&
|
|
policy != P_REQUIRE &&
|
|
policy != P_DONT) {
|
|
parse_warn (cfile,
|
|
"invalid authentication policy.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
config -> auth_policy = policy;
|
|
} else if (token != TOKEN_BOOTP) {
|
|
if (policy != P_PREFER &&
|
|
policy != P_IGNORE &&
|
|
policy != P_ACCEPT) {
|
|
parse_warn (cfile, "invalid bootp policy.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
config -> bootp_policy = policy;
|
|
} else {
|
|
parse_warn (cfile, "expecting a policy type.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
break;
|
|
|
|
case OPTION:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == SPACE) {
|
|
if (ip) {
|
|
parse_warn (cfile,
|
|
"option space definitions %s",
|
|
" may not be scoped.");
|
|
skip_to_semi (cfile);
|
|
break;
|
|
}
|
|
parse_option_space_decl (cfile);
|
|
return;
|
|
}
|
|
|
|
option = parse_option_name (cfile, 1, &known);
|
|
if (!option)
|
|
return;
|
|
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != CODE) {
|
|
parse_warn (cfile, "expecting \"code\" keyword.");
|
|
skip_to_semi (cfile);
|
|
free_option (option, MDL);
|
|
return;
|
|
}
|
|
if (ip) {
|
|
parse_warn (cfile,
|
|
"option definitions may only appear in %s",
|
|
"the outermost scope.");
|
|
skip_to_semi (cfile);
|
|
free_option (option, MDL);
|
|
return;
|
|
}
|
|
if (!parse_option_code_definition (cfile, option))
|
|
free_option (option, MDL);
|
|
return;
|
|
|
|
case MEDIA:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_string_list (cfile, &config -> media, 1);
|
|
return;
|
|
|
|
case HARDWARE:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (ip) {
|
|
parse_hardware_param (cfile, &ip -> hw_address);
|
|
} else {
|
|
parse_warn (cfile, "hardware address parameter %s",
|
|
"not allowed here.");
|
|
skip_to_semi (cfile);
|
|
}
|
|
return;
|
|
|
|
case REQUEST:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (config -> requested_options == default_requested_options)
|
|
config -> requested_options = (u_int32_t *)0;
|
|
parse_option_list (cfile, &config -> requested_options);
|
|
return;
|
|
|
|
case TIMEOUT:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_lease_time (cfile, &config -> timeout);
|
|
return;
|
|
|
|
case RETRY:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_lease_time (cfile, &config -> retry_interval);
|
|
return;
|
|
|
|
case SELECT_TIMEOUT:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_lease_time (cfile, &config -> select_interval);
|
|
return;
|
|
|
|
case OMAPI:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != PORT) {
|
|
parse_warn (cfile,
|
|
"unexpected omapi subtype: %s", val);
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != NUMBER) {
|
|
parse_warn (cfile, "invalid port number: `%s'", val);
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
tmp = atoi (val);
|
|
if (tmp < 0 || tmp > 65535)
|
|
parse_warn (cfile, "invalid omapi port %d.", tmp);
|
|
else if (config != &top_level_config)
|
|
parse_warn (cfile,
|
|
"omapi port only works at top level.");
|
|
else
|
|
config -> omapi_port = tmp;
|
|
parse_semi (cfile);
|
|
return;
|
|
|
|
case DO_FORWARD_UPDATE:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (!strcasecmp (val, "on") ||
|
|
!strcasecmp (val, "true"))
|
|
config -> do_forward_update = 1;
|
|
else if (!strcasecmp (val, "off") ||
|
|
!strcasecmp (val, "false"))
|
|
config -> do_forward_update = 0;
|
|
else {
|
|
parse_warn (cfile, "expecting boolean value.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
parse_semi (cfile);
|
|
return;
|
|
|
|
case REBOOT:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_lease_time (cfile, &config -> reboot_timeout);
|
|
return;
|
|
|
|
case BACKOFF_CUTOFF:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_lease_time (cfile, &config -> backoff_cutoff);
|
|
return;
|
|
|
|
case INITIAL_INTERVAL:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_lease_time (cfile, &config -> initial_interval);
|
|
return;
|
|
|
|
case SCRIPT:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_string (cfile, &config -> script_name, (unsigned *)0);
|
|
return;
|
|
|
|
case VENDOR:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != OPTION) {
|
|
parse_warn (cfile, "expecting 'vendor option space'");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != SPACE) {
|
|
parse_warn (cfile, "expecting 'vendor option space'");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (!is_identifier (token)) {
|
|
parse_warn (cfile, "expecting an identifier.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
config -> vendor_space_name = dmalloc (strlen (val) + 1, MDL);
|
|
if (!config -> vendor_space_name)
|
|
log_fatal ("no memory for vendor option space name.");
|
|
strcpy (config -> vendor_space_name, val);
|
|
for (i = 0; i < universe_count; i++)
|
|
if (!strcmp (universes [i] -> name,
|
|
config -> vendor_space_name))
|
|
break;
|
|
if (i == universe_count) {
|
|
log_error ("vendor option space %s not found.",
|
|
config -> vendor_space_name);
|
|
}
|
|
parse_semi (cfile);
|
|
return;
|
|
|
|
case INTERFACE:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (ip)
|
|
parse_warn (cfile, "nested interface declaration.");
|
|
parse_interface_declaration (cfile, config, (char *)0);
|
|
return;
|
|
|
|
case PSEUDO:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
name = dmalloc (strlen (val) + 1, MDL);
|
|
if (!name)
|
|
log_fatal ("no memory for pseudo interface name");
|
|
strcpy (name, val);
|
|
parse_interface_declaration (cfile, config, name);
|
|
return;
|
|
|
|
case LEASE:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_client_lease_statement (cfile, 1);
|
|
return;
|
|
|
|
case ALIAS:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_client_lease_statement (cfile, 2);
|
|
return;
|
|
|
|
case REJECT:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
parse_reject_statement (cfile, config);
|
|
return;
|
|
|
|
default:
|
|
lose = 0;
|
|
stmt = (struct executable_statement *)0;
|
|
if (!parse_executable_statement (&stmt,
|
|
cfile, &lose, context_any)) {
|
|
if (!lose) {
|
|
parse_warn (cfile, "expecting a statement.");
|
|
skip_to_semi (cfile);
|
|
}
|
|
} else {
|
|
struct executable_statement **eptr, *sptr;
|
|
if (stmt &&
|
|
(stmt -> op == send_option_statement ||
|
|
(stmt -> op == on_statement &&
|
|
(stmt -> data.on.evtypes & ON_TRANSMISSION)))) {
|
|
eptr = &config -> on_transmission -> statements;
|
|
if (stmt -> op == on_statement) {
|
|
sptr = (struct executable_statement *)0;
|
|
executable_statement_reference
|
|
(&sptr,
|
|
stmt -> data.on.statements, MDL);
|
|
executable_statement_dereference (&stmt,
|
|
MDL);
|
|
executable_statement_reference (&stmt,
|
|
sptr,
|
|
MDL);
|
|
executable_statement_dereference (&sptr,
|
|
MDL);
|
|
}
|
|
} else
|
|
eptr = &config -> on_receipt -> statements;
|
|
|
|
if (stmt) {
|
|
for (; *eptr; eptr = &(*eptr) -> next)
|
|
;
|
|
executable_statement_reference (eptr,
|
|
stmt, MDL);
|
|
}
|
|
return;
|
|
}
|
|
break;
|
|
}
|
|
parse_semi (cfile);
|
|
}
|
|
|
|
/* option-list :== option_name |
|
|
option_list COMMA option_name */
|
|
|
|
void parse_option_list (cfile, list)
|
|
struct parse *cfile;
|
|
u_int32_t **list;
|
|
{
|
|
int ix;
|
|
int token;
|
|
const char *val;
|
|
pair p = (pair)0, q, r;
|
|
struct option *option;
|
|
|
|
ix = 0;
|
|
do {
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == SEMI) {
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
break;
|
|
}
|
|
if (!is_identifier (token)) {
|
|
parse_warn (cfile, "%s: expected option name.", val);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
option = parse_option_name (cfile, 0, NULL);
|
|
if (!option) {
|
|
parse_warn (cfile, "%s: expected option name.", val);
|
|
return;
|
|
}
|
|
if (option -> universe != &dhcp_universe) {
|
|
parse_warn (cfile,
|
|
"%s.%s: Only global options allowed.",
|
|
option -> universe -> name, option->name );
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
r = new_pair (MDL);
|
|
if (!r)
|
|
log_fatal ("can't allocate pair for option code.");
|
|
r -> car = (caddr_t)(long)option -> code;
|
|
r -> cdr = (pair)0;
|
|
if (p)
|
|
q -> cdr = r;
|
|
else
|
|
p = r;
|
|
q = r;
|
|
++ix;
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
} while (token == COMMA);
|
|
if (token != SEMI) {
|
|
parse_warn (cfile, "expecting semicolon.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
/* XXX we can't free the list here, because we may have copied
|
|
XXX it from an outer config state. */
|
|
*list = (u_int32_t *)0;
|
|
if (ix) {
|
|
*list = dmalloc ((ix + 1) * sizeof **list, MDL);
|
|
if (!*list)
|
|
log_error ("no memory for option list.");
|
|
else {
|
|
ix = 0;
|
|
for (q = p; q; q = q -> cdr)
|
|
(*list) [ix++] = (u_int32_t)(long)q -> car;
|
|
(*list) [ix] = 0;
|
|
}
|
|
while (p) {
|
|
q = p -> cdr;
|
|
free_pair (p, MDL);
|
|
p = q;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* interface-declaration :==
|
|
INTERFACE string LBRACE client-declarations RBRACE */
|
|
|
|
void parse_interface_declaration (cfile, outer_config, name)
|
|
struct parse *cfile;
|
|
struct client_config *outer_config;
|
|
char *name;
|
|
{
|
|
int token;
|
|
const char *val;
|
|
struct client_state *client, **cp;
|
|
struct interface_info *ip = (struct interface_info *)0;
|
|
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != STRING) {
|
|
parse_warn (cfile, "expecting interface name (in quotes).");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
|
|
if (!interface_or_dummy (&ip, val))
|
|
log_fatal ("Can't allocate interface %s.", val);
|
|
|
|
/* If we were given a name, this is a pseudo-interface. */
|
|
if (name) {
|
|
make_client_state (&client);
|
|
client -> name = name;
|
|
client -> interface = ip;
|
|
for (cp = &ip -> client; *cp; cp = &((*cp) -> next))
|
|
;
|
|
*cp = client;
|
|
} else {
|
|
if (!ip -> client) {
|
|
make_client_state (&ip -> client);
|
|
ip -> client -> interface = ip;
|
|
}
|
|
client = ip -> client;
|
|
}
|
|
|
|
if (!client -> config)
|
|
make_client_config (client, outer_config);
|
|
|
|
ip -> flags &= ~INTERFACE_AUTOMATIC;
|
|
interfaces_requested = 1;
|
|
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != LBRACE) {
|
|
parse_warn (cfile, "expecting left brace.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
|
|
do {
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == END_OF_FILE) {
|
|
parse_warn (cfile,
|
|
"unterminated interface declaration.");
|
|
return;
|
|
}
|
|
if (token == RBRACE)
|
|
break;
|
|
parse_client_statement (cfile, ip, client -> config);
|
|
} while (1);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
}
|
|
|
|
int interface_or_dummy (struct interface_info **pi, const char *name)
|
|
{
|
|
struct interface_info *i;
|
|
struct interface_info *ip = (struct interface_info *)0;
|
|
isc_result_t status;
|
|
|
|
/* Find the interface (if any) that matches the name. */
|
|
for (i = interfaces; i; i = i -> next) {
|
|
if (!strcmp (i -> name, name)) {
|
|
interface_reference (&ip, i, MDL);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* If it's not a real interface, see if it's on the dummy list. */
|
|
if (!ip) {
|
|
for (ip = dummy_interfaces; ip; ip = ip -> next) {
|
|
if (!strcmp (ip -> name, name)) {
|
|
interface_reference (&ip, i, MDL);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* If we didn't find an interface, make a dummy interface as
|
|
a placeholder. */
|
|
if (!ip) {
|
|
isc_result_t status;
|
|
status = interface_allocate (&ip, MDL);
|
|
if (status != ISC_R_SUCCESS)
|
|
log_fatal ("Can't record interface %s: %s",
|
|
name, isc_result_totext (status));
|
|
strlcpy (ip -> name, name, IFNAMSIZ);
|
|
if (dummy_interfaces) {
|
|
interface_reference (&ip -> next,
|
|
dummy_interfaces, MDL);
|
|
interface_dereference (&dummy_interfaces, MDL);
|
|
}
|
|
interface_reference (&dummy_interfaces, ip, MDL);
|
|
}
|
|
if (pi)
|
|
status = interface_reference (pi, ip, MDL);
|
|
interface_dereference (&ip, MDL);
|
|
if (status != ISC_R_SUCCESS)
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
void make_client_state (state)
|
|
struct client_state **state;
|
|
{
|
|
*state = ((struct client_state *)dmalloc (sizeof **state, MDL));
|
|
if (!*state)
|
|
log_fatal ("no memory for client state\n");
|
|
memset (*state, 0, sizeof **state);
|
|
}
|
|
|
|
void make_client_config (client, config)
|
|
struct client_state *client;
|
|
struct client_config *config;
|
|
{
|
|
client -> config = (((struct client_config *)
|
|
dmalloc (sizeof (struct client_config), MDL)));
|
|
if (!client -> config)
|
|
log_fatal ("no memory for client config\n");
|
|
memcpy (client -> config, config, sizeof *config);
|
|
if (!clone_group (&client -> config -> on_receipt,
|
|
config -> on_receipt, MDL) ||
|
|
!clone_group (&client -> config -> on_transmission,
|
|
config -> on_transmission, MDL))
|
|
log_fatal ("no memory for client state groups.");
|
|
}
|
|
|
|
/* client-lease-statement :==
|
|
RBRACE client-lease-declarations LBRACE
|
|
|
|
client-lease-declarations :==
|
|
<nil> |
|
|
client-lease-declaration |
|
|
client-lease-declarations client-lease-declaration */
|
|
|
|
|
|
void parse_client_lease_statement (cfile, is_static)
|
|
struct parse *cfile;
|
|
int is_static;
|
|
{
|
|
struct client_lease *lease, *lp, *pl, *next;
|
|
struct interface_info *ip = (struct interface_info *)0;
|
|
int token;
|
|
const char *val;
|
|
struct client_state *client = (struct client_state *)0;
|
|
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != LBRACE) {
|
|
parse_warn (cfile, "expecting left brace.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
|
|
lease = ((struct client_lease *)
|
|
dmalloc (sizeof (struct client_lease), MDL));
|
|
if (!lease)
|
|
log_fatal ("no memory for lease.\n");
|
|
memset (lease, 0, sizeof *lease);
|
|
lease -> is_static = is_static;
|
|
if (!option_state_allocate (&lease -> options, MDL))
|
|
log_fatal ("no memory for lease options.\n");
|
|
|
|
do {
|
|
token = peek_token (&val, (unsigned *)0, cfile);
|
|
if (token == END_OF_FILE) {
|
|
parse_warn (cfile, "unterminated lease declaration.");
|
|
return;
|
|
}
|
|
if (token == RBRACE)
|
|
break;
|
|
parse_client_lease_declaration (cfile, lease, &ip, &client);
|
|
} while (1);
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
|
|
/* If the lease declaration didn't include an interface
|
|
declaration that we recognized, it's of no use to us. */
|
|
if (!ip) {
|
|
destroy_client_lease (lease);
|
|
return;
|
|
}
|
|
|
|
/* Make sure there's a client state structure... */
|
|
if (!ip -> client) {
|
|
make_client_state (&ip -> client);
|
|
ip -> client -> interface = ip;
|
|
}
|
|
if (!client)
|
|
client = ip -> client;
|
|
|
|
/* If this is an alias lease, it doesn't need to be sorted in. */
|
|
if (is_static == 2) {
|
|
ip -> client -> alias = lease;
|
|
return;
|
|
}
|
|
|
|
/* The new lease may supersede a lease that's not the
|
|
active lease but is still on the lease list, so scan the
|
|
lease list looking for a lease with the same address, and
|
|
if we find it, toss it. */
|
|
pl = (struct client_lease *)0;
|
|
for (lp = client -> leases; lp; lp = next) {
|
|
next = lp -> next;
|
|
if (lp -> address.len == lease -> address.len &&
|
|
!memcmp (lp -> address.iabuf, lease -> address.iabuf,
|
|
lease -> address.len)) {
|
|
if (pl)
|
|
pl -> next = next;
|
|
else
|
|
client -> leases = next;
|
|
destroy_client_lease (lp);
|
|
break;
|
|
} else
|
|
pl = lp;
|
|
}
|
|
|
|
/* If this is a preloaded lease, just put it on the list of recorded
|
|
leases - don't make it the active lease. */
|
|
if (is_static) {
|
|
lease -> next = client -> leases;
|
|
client -> leases = lease;
|
|
return;
|
|
}
|
|
|
|
/* The last lease in the lease file on a particular interface is
|
|
the active lease for that interface. Of course, we don't know
|
|
what the last lease in the file is until we've parsed the whole
|
|
file, so at this point, we assume that the lease we just parsed
|
|
is the active lease for its interface. If there's already
|
|
an active lease for the interface, and this lease is for the same
|
|
ip address, then we just toss the old active lease and replace
|
|
it with this one. If this lease is for a different address,
|
|
then if the old active lease has expired, we dump it; if not,
|
|
we put it on the list of leases for this interface which are
|
|
still valid but no longer active. */
|
|
if (client -> active) {
|
|
if (client -> active -> expiry < cur_time)
|
|
destroy_client_lease (client -> active);
|
|
else if (client -> active -> address.len ==
|
|
lease -> address.len &&
|
|
!memcmp (client -> active -> address.iabuf,
|
|
lease -> address.iabuf,
|
|
lease -> address.len))
|
|
destroy_client_lease (client -> active);
|
|
else {
|
|
client -> active -> next = client -> leases;
|
|
client -> leases = client -> active;
|
|
}
|
|
}
|
|
client -> active = lease;
|
|
|
|
/* phew. */
|
|
}
|
|
|
|
/* client-lease-declaration :==
|
|
BOOTP |
|
|
INTERFACE string |
|
|
FIXED_ADDR ip_address |
|
|
FILENAME string |
|
|
SERVER_NAME string |
|
|
OPTION option-decl |
|
|
RENEW time-decl |
|
|
REBIND time-decl |
|
|
EXPIRE time-decl |
|
|
KEY id */
|
|
|
|
void parse_client_lease_declaration (cfile, lease, ipp, clientp)
|
|
struct parse *cfile;
|
|
struct client_lease *lease;
|
|
struct interface_info **ipp;
|
|
struct client_state **clientp;
|
|
{
|
|
int token;
|
|
const char *val;
|
|
char *t, *n;
|
|
struct interface_info *ip;
|
|
struct option_cache *oc;
|
|
struct client_state *client = (struct client_state *)0;
|
|
struct data_string key_id;
|
|
|
|
switch (next_token (&val, (unsigned *)0, cfile)) {
|
|
case KEY:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != STRING && !is_identifier (token)) {
|
|
parse_warn (cfile, "expecting key name.");
|
|
skip_to_semi (cfile);
|
|
break;
|
|
}
|
|
if (omapi_auth_key_lookup_name (&lease -> key, val) !=
|
|
ISC_R_SUCCESS)
|
|
parse_warn (cfile, "unknown key %s", val);
|
|
parse_semi (cfile);
|
|
break;
|
|
case TOKEN_BOOTP:
|
|
lease -> is_bootp = 1;
|
|
break;
|
|
|
|
case INTERFACE:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != STRING) {
|
|
parse_warn (cfile,
|
|
"expecting interface name (in quotes).");
|
|
skip_to_semi (cfile);
|
|
break;
|
|
}
|
|
interface_or_dummy (ipp, val);
|
|
break;
|
|
|
|
case NAME:
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
ip = *ipp;
|
|
if (!ip) {
|
|
parse_warn (cfile, "state name precedes interface.");
|
|
break;
|
|
}
|
|
for (client = ip -> client; client; client = client -> next)
|
|
if (client -> name && !strcmp (client -> name, val))
|
|
break;
|
|
if (!client)
|
|
parse_warn (cfile,
|
|
"lease specified for unknown pseudo.");
|
|
*clientp = client;
|
|
break;
|
|
|
|
case FIXED_ADDR:
|
|
if (!parse_ip_addr (cfile, &lease -> address))
|
|
return;
|
|
break;
|
|
|
|
case MEDIUM:
|
|
parse_string_list (cfile, &lease -> medium, 0);
|
|
return;
|
|
|
|
case FILENAME:
|
|
parse_string (cfile, &lease -> filename, (unsigned *)0);
|
|
return;
|
|
|
|
case SERVER_NAME:
|
|
parse_string (cfile, &lease -> server_name, (unsigned *)0);
|
|
return;
|
|
|
|
case RENEW:
|
|
lease -> renewal = parse_date (cfile);
|
|
return;
|
|
|
|
case REBIND:
|
|
lease -> rebind = parse_date (cfile);
|
|
return;
|
|
|
|
case EXPIRE:
|
|
lease -> expiry = parse_date (cfile);
|
|
return;
|
|
|
|
case OPTION:
|
|
oc = (struct option_cache *)0;
|
|
if (parse_option_decl (&oc, cfile)) {
|
|
save_option (oc -> option -> universe,
|
|
lease -> options, oc);
|
|
option_cache_dereference (&oc, MDL);
|
|
}
|
|
return;
|
|
|
|
default:
|
|
parse_warn (cfile, "expecting lease declaration.");
|
|
skip_to_semi (cfile);
|
|
break;
|
|
}
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != SEMI) {
|
|
parse_warn (cfile, "expecting semicolon.");
|
|
skip_to_semi (cfile);
|
|
}
|
|
}
|
|
|
|
void parse_string_list (cfile, lp, multiple)
|
|
struct parse *cfile;
|
|
struct string_list **lp;
|
|
int multiple;
|
|
{
|
|
int token;
|
|
const char *val;
|
|
struct string_list *cur, *tmp;
|
|
|
|
/* Find the last medium in the media list. */
|
|
if (*lp) {
|
|
for (cur = *lp; cur -> next; cur = cur -> next)
|
|
;
|
|
} else {
|
|
cur = (struct string_list *)0;
|
|
}
|
|
|
|
do {
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
if (token != STRING) {
|
|
parse_warn (cfile, "Expecting media options.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
|
|
tmp = ((struct string_list *)
|
|
dmalloc (strlen (val) + sizeof (struct string_list),
|
|
MDL));
|
|
if (!tmp)
|
|
log_fatal ("no memory for string list entry.");
|
|
|
|
strcpy (tmp -> string, val);
|
|
tmp -> next = (struct string_list *)0;
|
|
|
|
/* Store this medium at the end of the media list. */
|
|
if (cur)
|
|
cur -> next = tmp;
|
|
else
|
|
*lp = tmp;
|
|
cur = tmp;
|
|
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
} while (multiple && token == COMMA);
|
|
|
|
if (token != SEMI) {
|
|
parse_warn (cfile, "expecting semicolon.");
|
|
skip_to_semi (cfile);
|
|
}
|
|
}
|
|
|
|
void parse_reject_statement (cfile, config)
|
|
struct parse *cfile;
|
|
struct client_config *config;
|
|
{
|
|
int token;
|
|
const char *val;
|
|
struct iaddr addr;
|
|
struct iaddrlist *list;
|
|
|
|
do {
|
|
if (!parse_ip_addr (cfile, &addr)) {
|
|
parse_warn (cfile, "expecting IP address.");
|
|
skip_to_semi (cfile);
|
|
return;
|
|
}
|
|
|
|
list = (struct iaddrlist *)dmalloc (sizeof (struct iaddrlist),
|
|
MDL);
|
|
if (!list)
|
|
log_fatal ("no memory for reject list!");
|
|
|
|
list -> addr = addr;
|
|
list -> next = config -> reject_list;
|
|
config -> reject_list = list;
|
|
|
|
token = next_token (&val, (unsigned *)0, cfile);
|
|
} while (token == COMMA);
|
|
|
|
if (token != SEMI) {
|
|
parse_warn (cfile, "expecting semicolon.");
|
|
skip_to_semi (cfile);
|
|
}
|
|
}
|
|
|
|
/* allow-deny-keyword :== BOOTP
|
|
| BOOTING
|
|
| DYNAMIC_BOOTP
|
|
| UNKNOWN_CLIENTS */
|
|
|
|
int parse_allow_deny (oc, cfile, flag)
|
|
struct option_cache **oc;
|
|
struct parse *cfile;
|
|
int flag;
|
|
{
|
|
enum dhcp_token token;
|
|
const char *val;
|
|
unsigned char rf = flag;
|
|
struct expression *data = (struct expression *)0;
|
|
int status;
|
|
|
|
parse_warn (cfile, "allow/deny/ignore not permitted here.");
|
|
skip_to_semi (cfile);
|
|
return 0;
|
|
}
|
|
|